Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Indium oxide In2O3 thin films fabricated using thermal evaporation of indium metal in vacuum on a glass substrate at 25oC using array mask, after deposition the indium films have been subjected to thermal oxidation at temperature 400 °C for 1h. The results of prepared Indium oxide reveal the oxidation method as a strong effect on the morphology and optical properties of the samples as fabricated. The band gap (Eg) of In2O3 films at 400 °C is 2.7 eV. Then, SEM and XRD measurements are also used to investigate the morphology and structure of the indium oxide In2O3 thin films. The antimicrobial activity of indium oxide In2O3 thin films was assessed against gram-negative bacterium using inhibition zone of bacteria which improved higher ina
... Show MoreThe using of recycled aggregates from construction and demolition waste (CDW) can preserve natural aggregate resources, reduce the demand for landfill, and contribute to a sustainable built environment. Concrete demolition waste has been proven to be an excellent source of aggregates for new concrete production. At a technical, economic, and environmental level, roller compacted concrete (RCC) applications benefit various civil construction projects. Roller Compacted Concrete (RCC) is a homogenous mixture that is best described as a zero-slump concrete placed with compacting equipment, uses in storage areas, dams, and most often as a basis for rigid pavements. The mix must be sufficiently dry to support
... Show MoreIn this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la
Background: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c
... Show MoreLet R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes
In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them
Field trial was conducted during the growing season of 2011-2012 at the Research
Field, Department of Biology, College of Science, Baghdad University to test the
performance of wheat cv Rabyaa, Latifiya, Al-Iraq, Tummose 2, Abu-Graib 3, IPA
99 and Sham 6 grown under different soil water deficit stresses. Several agronomic
and physiological traits and yield and yield components of the test cultivars were
determined. The experiment was conducted in split plot design with five replications
for each treatment. The cultivars were kept in the sub plot while water stress
treatment was assigned as main plot. Water stress was applied by irrigated the plots
to the soil field capacity (FC) then withheld next irrigation until
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Empirical equation has been presented to predict the optimum hydrodynamic
pressure gradient with optimum mud flow rate (one equation) of five Iraqi oil wells
to obtain the optimum carrying capacity of the drilling fluid ( optimum transport
cuttings from the hole to the surface through the annulus).
This equation is a function of mud flow rate, mud density and penetration
rate without using any charts or graphs.
The correlation coefficient accuracy is more than 0.9999.
The article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons
... Show More